Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Abusability of Automation Apps in Intimate Partner Violence

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how smartphone automation apps like iOS Shortcuts, Samsung Modes & Routines, Tasker, and IFTTT can be exploited for surveillance and harassment in intimate partner violence scenarios through this 15-minute conference presentation from USENIX Security '25. Examine a systematic analysis of four popular automation platforms and their potential for abuse, including capabilities that enable monitoring, impersonation, overloading, and controlling victims. Learn about the research methodology used to evaluate 12,962 publicly available Shortcuts recipes, which identified 1,014 potentially malicious automation scripts designed for surveillance and harassment purposes. Discover the inadequacies of current notification and logging mechanisms in these platforms that fail to adequately warn victims or help them identify abuse sources. Understand the detection mechanism developed by researchers to identify potentially harmful automation recipes and gain insights into proposed mitigation strategies for both users and platform providers to address these security vulnerabilities in automation applications.

Syllabus

USENIX Security '25 - Abusability of Automation Apps in Intimate Partner Violence

Taught by

USENIX

Reviews

Start your review of Abusability of Automation Apps in Intimate Partner Violence

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.